Skip to content

Commit 5a1bf3f

Browse files
authored
Merge branch 'main' into US302646_3P_Main
2 parents 2ce5e64 + 8a30986 commit 5a1bf3f

File tree

6 files changed

+91
-7
lines changed

6 files changed

+91
-7
lines changed

exposure-management/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,9 @@
6767
- name: Review security initiatives
6868
href: initiatives.md
6969
- name: Investigate security metrics
70+
- name: Security initiatives catalog
71+
href: initiatives-list.md
72+
- name: Investigate initiative metrics
7073
href: security-metrics.md
7174
- name: Review security recommendations
7275
href: security-recommendations.md

exposure-management/exposure-insights-overview.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,4 @@ Events measure the score drop or worsening in the metric status. Events include:
167167

168168
## Next steps
169169

170-
- [Review security initiatives](initiatives.md)
171-
- [Investigate security metrics](security-metrics.md)
172-
- [Review security recommendations](security-recommendations.md)
173-
- [Explore security events](security-events.md)
170+
- [Investigate security initiative metrics](security-metrics.md)
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
title: Security initiatives in Microsoft Security Exposure Management
3+
description: Catalog of security Initiatives in Microsoft Security Exposure Management.
4+
ms.author: dlanger
5+
author: dlanger
6+
manager: rayne-wiselman
7+
ms.topic: reference
8+
ms.service: exposure-management
9+
ms.date: 11/12/2024
10+
---
11+
12+
# Security Initiatives
13+
14+
This is a catalog of security initiatives in Microsoft Security Exposure Management. Each initiative is designed to help you manage and improve the security posture of your organization.
15+
16+
## Business Email Compromise - Financial fraud
17+
18+
Business email compromise (BEC) financial fraud is a social engineering attack that aims to steal money or sensitive information. The attacker tricks the target into believing they're interacting with a trusted entity to conduct either personal or professional business. After deceiving the target, the attacker persuades them to share valuable information or process a payment.
19+
20+
## CIS Microsoft 365 Foundations Benchmark
21+
22+
The CIS Microsoft 365 Foundations Benchmark (v3.0.0) is a set of security assessments developed by the Center for Internet Security (CIS). It provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365. The benchmark includes configuration baselines and best practices for securely configuring a system. The benchmark is internationally recognized as a security standard for defending IT systems and data against cyber attacks. This initiative contains a subset of security assessments recommended by the CIS
23+
24+
## Cloud Security [Preview]
25+
26+
This initiative aims to reflect the status around cloud security coverage, ROI, health, configuration, and performance. It consists of measurements across multiple domains and disciplines to provide security managers with a high-level view into how posture is enforced in cloud ops.
27+
28+
## Critical Asset Protection
29+
30+
Critical asset protection refers to the strategies, processes, and technologies implemented to safeguard an organization's most valuable and important assets from various threats and risks. It involves identifying, prioritizing, and applying targeted security measures to ensure the resilience and integrity of these critical assets.
31+
32+
[Learn more here.](https://aka.ms/xspm/cspm)
33+
34+
## Endpoint Security
35+
36+
Monitor the coverage and configuration of physical and virtual workstations, servers, and mobile phones.
37+
38+
## Enterprise IoT Security
39+
40+
IoT devices are often connected to endpoints, to one another or to the internet, which means they're potential targets for cyber attacks. It's imperative for businesses to monitor the security of their IoT devices, including their spread, configuration, connectivity, exposure, and behavior. This initiative provides overall visibility into the risk introduced by IoT devices in the enterprise and the resilience the organization has to mitigate it.
41+
42+
## External Attack Surface Protection
43+
44+
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization. This initiative requires no license and is complementary.
45+
46+
[Learn more here.](https://aka.ms/xspm/EasmLearnMore)
47+
48+
## Identity Security
49+
50+
Identity security is the practice of protecting the digital identities of individuals and organizations. This includes protecting passwords, usernames, and other credentials that can be used to access sensitive data or systems. Identity security is essential for protecting against a wide range of cyber threats, including phishing, malware, and data breaches. By taking proactive steps, organizations can help to protect their digital identities and sensitive data from cyber threats.
51+
52+
## OT Security [Preview]
53+
54+
Monitors and safeguards Operational Technology (OT) environments within the organization by employing network layer monitoring. This initiative identifies devices across physical sites, pinpoints their risks, and ensures comprehensive protection and security management of OT systems.
55+
56+
## Ransomware Protection
57+
58+
Ransomware attacks have become increasingly common in recent years, and they can have a devastating impact on organizations. Organizations can and should be proactive in managing a good security posture against ransomware. One of the first steps is to ensure that recommended controls are in place and are utilized and configured properly, hence reducing the risk of a successful ransomware attack making way into corporate networks and assets.
59+
60+
## SaaS Security
61+
62+
This initiative focuses on displaying the current state of SaaS (software as a service) security coverage, health, configuration, and performance. It consists of metrics across multiple domains and disciplines to provide security managers with a high-level view into their SaaS security posture management. To make the most of this Initiative, activate application connectors for the following: Microsoft 365, Salesforce, ServiceNow, GitHub, Okta, Citrix ShareFile, DocuSign, Dropbox, Google Workspace, NetDocuments, Workplace (preview), Zendesk, Zoom (preview), Atlassian. Learn more on connectors enablement: [https://aka.ms/AAs4lmg](https://aka.ms/AAs4lmg)
63+
64+
[Learn more here.](/defender-cloud-apps/saas-security-initiative)
65+
66+
## Vulnerability Assessment
67+
68+
This initiative serves as a central hub for security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track, and delegate vulnerabilities with in the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement. This collaborative environment ensures a holistic approach to vulnerability management, empowering stakeholders to proactively strengthen their security defenses, reduce the attack surface, and enhance overall resilience against evolving cyber threats.
69+
70+
## Zero Trust (Foundational)
71+
72+
Zero Trust is a security strategy that follows three principles, verify explicitly, use least privilege access, and assume breach. This initiative follows Microsoft's Zero Trust adoption framework to help you identify next steps in your Zero Trust strategy. You can learn more about the Zero Trust adoption framework here.
73+
74+
[Learn more here.](https://aka.ms/xspm/zeroTrustLearnMore)
75+
76+
## Next steps
77+
78+
- [Investigate security initiative metrics](security-metrics.md)
41.1 KB
Loading

exposure-management/security-metrics.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: exposure-management
99
ms.date: 11/13/2024
1010
---
1111

12-
# Investigate security metrics
12+
# Investigate security initiative metrics
1313

14-
Security metrics in [Microsoft Security Exposure Management](microsoft-security-exposure-management.md) measure security exposure for a specific scope of assets or resources within a [security initiative](exposure-insights-overview.md). Most security initiatives (but not all) have metrics associated with them.
14+
Security initiative metrics in [Microsoft Security Exposure Management](microsoft-security-exposure-management.md) measure security exposure for a specific scope of assets or resources within a [security initiative](exposure-insights-overview.md). Most security initiatives (but not all) have metrics associated with them.
1515

1616
## Prerequisites
1717

@@ -27,7 +27,7 @@ Security metrics in [Microsoft Security Exposure Management](microsoft-security-
2727

2828
## Review security metrics
2929

30-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select **Exposure management -> Exposure insights ->Metrics** to open the [Metrics](https://security.microsoft.com/exposure-metrics) page.
30+
1. In the [Microsoft Defender portal](https://security.microsoft.com), select **Exposure management -> Exposure insights -> Metrics** to open the [Metrics](https://security.microsoft.com/exposure-metrics) page.
3131

3232
:::image type="content" source="./media/metrics.png" alt-text="Screenshot of the metrics page in Microsoft Security Exposure management.":::
3333

exposure-management/whats-new.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,12 @@ The Device Inventory and Attack Surface Map now display the data sources for eac
3939

4040
For more information on understanding data from external sources, see [Getting value from your data connectors](value-data-connectors.md)
4141

42+
### OT security initiative
43+
44+
The new Operational Technology (OT) security initiative equips practitioners with a powerful tool to identify, monitor, and mitigate risks across the OT environment, ensuring both operational reliability and safety. This initiative aims to identify devices across physical sites, assess their associated risks, and provide faster, more effective protection for OT systems.
45+
46+
For more information, see, [Review security initiatives](initiatives.md)
47+
4248
### Microsoft Security Exposure Management is now supported in Microsoft Defender XDR Unified role-based access control (RBAC)
4349

4450
Access control to Microsoft Security Exposure Management can now be managed using Microsoft Defender XDR Unified Role-Based Access Control (RBAC) permissions model with dedicated and granular permissions.

0 commit comments

Comments
 (0)